Which of the following attacks would most likely be used to discover users, printers, and other objects within a network?
It is a new employee's first day on the job. When trying to access secured systems, he incorrectly enters his credentials multiple times. Which resulting action should take place?
The network administrator for an organization has read several recent articles stating that replay attacks are on the rise. Which of the following secure protocols could the administrator implement to prevent replay attacks via remote workers' VPNs? (Choose three.)
Which of the following methods or technologies is most likely to be used in order to mitigate brute force attacks?
Which of the following is the BEST encryption standard to implement for securing bulk data?